Admin

Hardware-level exploit in Apple Silicon may compromise private data


A team of security researchers from a university has discovered a chip-level exploit in Apple Silicon Macs. The researchers have found that this flaw can bypass the computer’s encryption and access its security keys, potentially exposing the Mac’s private data to hackers. However, to exploit this vulnerability, one would need to circumvent Apple’s Gatekeeper protections, install a malicious app, and let the software run for up to 10 hours under complex conditions, making the threat less likely in real-world scenarios.

The exploit is linked to a component of Apple’s M-series chips called Data Memory-Dependent Prefetchers (DMPs), which optimize processor performance by caching data in advance. The DMPs interpret data patterns as instructions, anticipating which information they need to access next. This helps improve speed and efficiency, characteristics often associated with Apple Silicon.

According to the researchers, attackers can utilize the DMP to bypass encryption and access sensitive data. They have named this attack GoFetch and have developed an app that can retrieve a Mac’s secure data without requiring root access. This poses a significant security risk as it exposes program data to potential threats.

The researchers emphasized that the security threat from DMPs is more severe than previously believed, highlighting the first end-to-end attacks on security-critical software using Apple’s M-series DMP. While the technical details are complex, the researchers’ findings underscore the need for vigilance in protecting sensitive data stored on M-series Macs.

It is important to note that Apple may not be able to address this issue with software updates for existing chips without impacting the performance of Apple Silicon. However, as long as Apple’s Gatekeeper feature is enabled (the default setting), the risk of installing malicious apps is significantly reduced. Gatekeeper only allows apps from the Mac App Store and non-App Store installations from Apple registered developers, serving as a protective barrier against potential threats. Users are advised to exercise caution when approving apps from unregistered developers in their macOS security settings to minimize the chances of falling victim to such exploits on M-series Macs.



Source link

Leave a Comment